摘要:
A system for transmitting secured data is disclosed. A plurality of interconnected nodes access a distributed directory having a plurality of objects and attributes. An access control mechanism controls access to the distributed directory. An encryption system and a decryption system are used to encrypt and decrypt secret data. The resulting encrypted data is associated with an attribute of an object, whereby access to the secret data is permitted if (i) the access control mechanism permits access to the attribute, and (ii) decryption information is presented to the decryption system to decrypt the secret data.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A method and system for supplanting a first name base with a second name base. The system consolidates name bases from different network operating systems into a single name base administrable from a single administration utility. Existing first name base applications continue to execute without modification, as communications are transparently translated and redirected to the second name base, and responses translated and communicated back into a format associated with the first name base. The method and system simplify administration of the network, and consolidate multiple name bases into a single name base.
摘要:
Methods and systems are provided for database-style access to a directory services repository stored on a computer network. A directory services application programming interface is controlled by a driver. The driver translates relational database language statements, such as ODBC-compliant SQL statements, into an executable API sequence that produces an API result. The driver also translates the API result into a relational database result. The repository may be a Novell Directory Services repository or an X.500 directory services repository. The invention maps an effective class of the repository to a table identified in the relational database language statement. Each object that is an instance of the effective class is mapped to a row in the table, and each attribute maps to a column of the table. As a result, the invention allows database tools such as report generators to work with the information stored in the repository.
摘要:
Computer system for storing and securing executable content is disclosed. A plurality of interconnected nodes access the distributed directory. The distributed directory has a hierarchy of objects each having one or more associated attributes. An access control mechanism is operative to control access to the distributed directory. A target object within the distributed directory has a target attribute, wherein access to a target object is controlled by the access control mechanism. A program is stored as a value in the target attribute, such that access to the program is controlled by the access control mechanism.
摘要:
A method and apparatus for managing a heterogeneous network is disclosed. A first computer system has one or more identities. A management service on a second computer system manages objects on the second computer system. One or more objects on the second computer system represent the one or more identities and are adapted to be managed by the management service. An event monitor operating on the second computer system is operative to send messages relating to changes to the one or more objects. A replication agent operating on the first computer system is operative to receive messages from the event monitor and is operative to synchronize the one or more identities to the changes made to the one or more objects.